5 Tips for Collecting Vendor Statements
October 18, 2020TAG Inc. Announces Strategic Partnership With LAVA Technology Services
March 25, 2021Cyberattacks have been a growing threat in healthcare over the past year and there is no end in sight. In fact, one Georgia University Hospital reported defending against 550 cyberattacks on their Epic MyChart system each day – 20% of them coming from emails to staff.
However, not all attacks are defended. In 2019, 41.4 million patient records were compromised – almost three times more than 2018, and the COVID-19 pandemic heightened this in 2020 as many healthcare workers moved to virtual workspaces. Recent survey results suggest that 1,500 healthcare providers are vulnerable to data breaches of 500 or more records, representing a 300% increase over 2019.
healthcare providers are vulnerable to data breaches of 500+ records
How are patient records being compromised?
Human behavior is the largest factor in over 60% of healthcare data breaches (through malware, hacking, and social media or email phishing).How can all healthcare staff do their part to protect their patients?
While every health system continues to tighten down on controls to prevent cyberattacks (virus and malware protection, software patching, spam filtering), every employee - nurse, AP clerk, maintenance worker, etc. - must do their part to reduce the human error aspect. After all, even secure technological systems can be thwarted by untrained or inadvertent actions.
For example, phishing, a top scheme planted by hackers, preys on human behavior by impersonating a credible contact, often an authority figure, and prompting a response. To help reduce this, TAG’s VP of Business Solutions overseeing IT, put together this list to help against phishing attempts:
Are you being asked to send sensitive information via email? Legitimate senders to not request personal information such as passwords, social security numbers, or credit card numbers via email.
Each of these is a tip-off to a threat that can be avoided with extra attention. Examples like this can be used to tighten spam email rules – by yourself or your system administrator.
If phishing schemes are found, notify your IT department as soon as possible to reduce the threat of others within your organization falling victim.
Collective action is essential to protect data from increasingly stealthy threats. When everyone plays their part, we can all keep ourselves and our data secure from ‘dechickens’ out there.